A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures.
Jason ChiaJi-Jian ChinSook-Chin YipPublished in: Symmetry (2021)
Keyphrases
- signature scheme
- signcryption scheme
- bilinear pairings
- digital signature scheme
- designated verifier
- identity based cryptography
- identity based signature
- key management
- key distribution
- standard model
- provably secure
- blind signature scheme
- key management scheme
- digital signature
- public key cryptosystem
- blind signature
- public key
- security model
- private key
- diffie hellman
- encryption scheme
- secret sharing scheme
- identity based encryption
- lower bound
- protection scheme
- signature recognition
- public key cryptography
- cca secure
- secret key
- key agreement protocol
- worst case
- resource constrained
- security analysis
- information security
- key agreement
- electronic voting
- ad hoc networks
- upper bound
- high security
- secure communication
- security services
- authentication protocol
- statistical databases
- hash functions
- security issues
- security requirements
- key exchange
- intrusion detection
- ciphertext
- wireless sensor networks